- Learn Kubernetes Security
- Kaizhe Huang Pranjal Jumde Loris Degioanni
- 183字
- 2021-06-18 18:32:36
Threats in Kubernetes clusters
With our new understanding of Kubernetes components and threat actors, we're moving on to the journey of threat modeling a Kubernetes cluster. In the following table, we cover the major Kubernetes components, nodes, and pods. Nodes and pods are the fundamental Kubernetes objects that run workloads. Note that all these components are assets and should be protected from threats. Any of these components getting compromised could lead to the next step of an attack, such as privilege escalation. Also, note that kube-apiserver and etcd are the brain and heart of a Kubernetes cluster. If either of them were to get compromised, that would be game over.
The following table highlights the threats in the default Kubernetes configuration. This table also highlights how developers and cluster administrators can protect their assets from these threats:




This table only highlights some of the threats. There are more threats, which will be covered in later chapters. We hope the preceding table will inspire you to think out loud about what needs to be protected and how to protect it in your Kubernetes cluster.
- Managing IaaS and DBaaS Clouds with Oracle Enterprise Manager Cloud Control 12c
- 自愿審計(jì)動(dòng)機(jī)與質(zhì)量研究:基于我國(guó)中期財(cái)務(wù)報(bào)告審計(jì)的經(jīng)驗(yàn)證據(jù)
- 金融保險(xiǎn)集團(tuán)內(nèi)部審計(jì)創(chuàng)新與實(shí)踐
- Mastering System Center Configuration Manager
- 會(huì)計(jì)信息化基礎(chǔ)(金蝶版)
- Citrix? XenMobile? Mobile Device Management
- Learning Informatica PowerCenter 9.x
- 行政單位經(jīng)濟(jì)責(zé)任審計(jì)實(shí)務(wù)指南
- 企業(yè)內(nèi)部審計(jì)全流程指南
- 內(nèi)審人員進(jìn)階之道:內(nèi)部審計(jì)操作實(shí)務(wù)與案例解析
- 統(tǒng)計(jì)學(xué)理論前沿(谷臻小簡(jiǎn)·AI導(dǎo)讀版)
- Building Dashboards with Microsoft Dynamics GP 2016(Second Edition)
- 統(tǒng)計(jì)原理與實(shí)務(wù)
- Microsoft SharePoint 2010 Developer’s Compendium:The Best of Packt for Extending SharePoint
- 政府審計(jì)基本理論探索